General
-
Target
ee8691df830c8049a82b6742c7b87ab9_JaffaCakes118
-
Size
139KB
-
Sample
240920-1433ka1elq
-
MD5
ee8691df830c8049a82b6742c7b87ab9
-
SHA1
fc0b9af297d018fd313934248f5e7e9aac4752da
-
SHA256
a973fb7943766b57cd43a3411ebc0e4f2526142e27a0c7e259a0fdabd30a5596
-
SHA512
52cf16dc38ff9391c343b4a3058b3da0d51a4b2a89ec3a066d61d0596fb01e9c239b01a7ec1cb9d87267555e467c9511ebc16eb0dbc2a0618077745109724eaf
-
SSDEEP
1536:mxRD3bNqfNpu39IId5a6XP3Mg8afyqsTqc380Y:ER1qf69xak3MgxyHqI80Y
Static task
static1
Behavioral task
behavioral1
Sample
ee8691df830c8049a82b6742c7b87ab9_JaffaCakes118.doc
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ee8691df830c8049a82b6742c7b87ab9_JaffaCakes118.doc
Resource
win10v2004-20240802-en
Malware Config
Extracted
http://edu.jmsvclass.com/wp-includes/sZmjSq/
http://darkblessing.net/e4wftkpn/KNAO9/
http://trancisconsulting.com/wp-admin/EEoF/
http://devanyastore.com/wp-content/9J56juA/
http://healthcureathome.com/ALFA_DATA/iKSdCK6/
http://www.szwymall.com/wp-content/j29mvS/
http://www.jornco.com/wp-admin/UT0xBJw/
Targets
-
-
Target
ee8691df830c8049a82b6742c7b87ab9_JaffaCakes118
-
Size
139KB
-
MD5
ee8691df830c8049a82b6742c7b87ab9
-
SHA1
fc0b9af297d018fd313934248f5e7e9aac4752da
-
SHA256
a973fb7943766b57cd43a3411ebc0e4f2526142e27a0c7e259a0fdabd30a5596
-
SHA512
52cf16dc38ff9391c343b4a3058b3da0d51a4b2a89ec3a066d61d0596fb01e9c239b01a7ec1cb9d87267555e467c9511ebc16eb0dbc2a0618077745109724eaf
-
SSDEEP
1536:mxRD3bNqfNpu39IId5a6XP3Mg8afyqsTqc380Y:ER1qf69xak3MgxyHqI80Y
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Drops file in System32 directory
-